Browse Source

an abstract, that needs more work

svn:r3519
Roger Dingledine 21 years ago
parent
commit
a94fef2e67
1 changed files with 13 additions and 2 deletions
  1. 13 2
      doc/design-paper/challenges.tex

+ 13 - 2
doc/design-paper/challenges.tex

@@ -24,7 +24,18 @@
 \pagestyle{empty}
 \pagestyle{empty}
 
 
 \begin{abstract}
 \begin{abstract}
-foo
+
+We describe our experiences with deploying Tor, a low-latency anonymous
+communication system that has been funded both by the U.S.~government
+and also by the Electronic Frontier Foundation.
+
+Because of its simplified threat model, Tor does not aim to defend
+against many of the attacks in the literature.
+
+We describe both policy issues that have come up from operating the
+network and technical challenges in building a more sustainable and
+scalable network.
+
 \end{abstract}
 \end{abstract}
 
 
 \section{Introduction}
 \section{Introduction}
@@ -42,7 +53,7 @@ Subject to this restriction, we try to
 provide as much anonymity as we can. In particular, because we
 provide as much anonymity as we can. In particular, because we
 support interactive communications without impractically expensive padding,
 support interactive communications without impractically expensive padding,
 we fall prey to a variety
 we fall prey to a variety
-of intra-network~\cite{attack-tor-oak05,flow-correlation04,bar} and
+of intra-network~\cite{back01,attack-tor-oak05,flow-correlation04} and
 end-to-end~\cite{danezis-pet2004,SS03} anonymity-breaking attacks.
 end-to-end~\cite{danezis-pet2004,SS03} anonymity-breaking attacks.
 
 
 Tor is secure so long as adversaries are unable to
 Tor is secure so long as adversaries are unable to